The Telecommunications Regulatory Authority (TRA), represented by the National Computer Emergency Response Team (aeCERT), and the International Council of E-Commerce Consultants (EC-Council) launched a nationwide campaign aiming to educate students on cyber security and the risks of improper use of the internet. aeCERT also endorsed the ‘Global CyberLympics’ initiative.
The Global CyberLympics is an annual series of team-based cyber security games, with regional championships across different continents, and conclude with a world finals championship. The Global CyberLympics Middle East Championships will host the most skilled white hat hackers from the region, and the top two teams will represent the region to compete in the world finals championship in 2012. This not-for-profit initiative will create a platform through which information and expertise can be exchanged to support information security sector in the region.
In his opening statement during the press conference, H.E. Majed Almesmar, TRA Deputy Director General said, “Proceeding from our belief in the importance of providing a safe cyber environment for UAE Internet users, we are glad to sponsor and support the Global CyberLympics Middle East Championships held during GITEX Technology Week. We believe that such events will help us uncover new talents and ideas in the field of information security, as well as contribute to raising global awareness on such issues and foster partnerships within information technology field among the nations of the globe.” Read more…
The first ever CyberLympics regional finals at Gitex Technology Week head towards the climax of the competition with some of the most skilful hackers from India and the Middle East taking part in a series of ethical challenges to attack and defend a number of software targets.
Covering web applications, OS compromise, exploit hunting, and lock picking, the event involves six teams from India, Jordan and the UAE pitted against each other to highlight the sophistication and speed of ICT security.
“It gives us great pleasure to be partnering with Gitex to host the region’s first CyberLympics finals,” said Leonard Chin, Vice Chair of the Global CyberLympics Organizing Committee. “CyberLympics involves a tremendous amount of skill and it’s a lot of fun, but it is also an excellent way to raise awareness of cybercrime. We have already seen a great attendance throughout the championship and I expect the audience will grow even more for the final day.”
Stuxnet and SCADA security will be discussed at this year’s Hacker Halted USA, October 25-27 in Miami, Florida. The premier east coast information security conference is devoting an entire track to SCADA and Critical Infrastructure threats and will provide presentations from leading industry experts and a panel discussion on Stuxnet proliferation moderated by The Washington Times security reporter Shaun Waterman. More information can be found at http://www.hackerhalted.com
Miami, FL (PRWEB) October 03, 2011
Hacker Halted USA, the technical information security conference organized by EC-Council that will take place in Miami this Fall, created a focused forum that discusses on issues of SCADA and Critical Infrastructure security. The emergence of the Stuxnet worm in 2010 was a major turning point in the history of cyberwar. Stuxnet, the world’s most sophisticated cyber weapon to date (at least, that we know of), was designed for the expressed purpose of physically disabling an Iranian nuclear power plant – an event rarely seen on the world stage.
According to the W32.Stuxnet Dossier released by Symantec in February 2011, Stuxnet is a threat that was primarily written to target an industrial control system or set of similar systems. Industrial control systems are used in gas pipelines and power plants. Its final goal is to reprogram industrial control systems (ICS) by modifying code on programmable logic controllers (PLCs) to make them work in a manner the attacker in¬tended and to hide those changes from the operator of the equipment.
The Washington Times security reporter Shaun Waterman will be moderating a Hacker Halted panel discussion on October 26 entitled, “SCADA Hacking: The Proliferation of Weapons for the Next World War.” This panel, with experts Jonathan Pollet, Tiffany Rad, Matthew Luallen and others, will discuss the potential cyber war implications of the Stuxnet worm – specifically, how it is at risk of being reproduced by other national governments, organized crime, hacktivists and others. As Waterman notes, now that Stuxnet has got the attention of the global computer security community, ingenious hackers – some with no background at all in ICS/SCADA – have been able to devise effective attacks against SCADA systems. The panel discussion will seek to answer key questions about the open source availability of SCADA attacks, how industrial operators can protect themselves and what the government’s role should be in safeguarding US SCADA systems.
Due to the significance of the Stuxnet threat and more SCADA vulnerabilities being uncovered, this IT security conference is devoting an entire conference track to examining the latest security risks and flaws in SCADA, and the risk of proliferation of Stuxnet-like worms, from the industry’s top minds.
In addition to Shaun Waterman’s SCADA panel discussion, Hacker Halted USA will also showcase several cutting-edge presentations from key experts in the field such as:
New SCADA Attacks – APT, Night Dragon and Stuxnet – Everybody is Kung Fu Fighting & DIY SCADA Security – Learn How to Build Your Own SCADA Defense Solutions — by Jonathan Pollet.
SCADA and PLC Vulnerabilities In Correctional Facilities – by Tiffany Rad, Teague Newman and John Strauchs.
SCADA Dismissal Or Bang-Bang SCADA (A new tool will be revealed in the talk) – by Yaniv Miron..
Control System Cybersecurity Training Kit (Live Demonstration) – by Matthew E. Luallen.
SCADA Security – Why Is It So Hard – by Amol Sarwate.
New Cyber Warfare Targets – SCADA Systems – by Robert M. Lee
The full program and agenda of Hacker Halted USA 2011 can be found HERE.
Hacker Halted USA, EC-Council’s flagship information security conference and a leading East Coast venue for cybersecurity research announcements, takes place from October 21-27 at the InterContinental Miami. Hacker Halted provides four days of information security training, October 21-24, followed by a three-day conference, October 25-27, of keynotes, panel discussions, presentations and demos from the world’s foremost experts in cybersecurity – including Bruce Schneier, George Kurtz, Charlie Miller, Jeremiah Grossman, Barnaby Jack, Dino Dai Zovi, Moxie Marlinspike, Philippe Courtot, Jeff Bardin, and more.
For more information on Hacker Halted USA 2011, visit the website at http://www.hackerhalted.com/2011
leonard [at] eccouncil.org
ABOUT HACKER HALTED:
Hacker Halted is EC-Council’s premier global information security conference series, dedicated to raising international awareness towards increased education and ethics in information security. Hacker Halted is a vendor neutral platform that provides CXOs and senior IT security professionals with the opportunity to assess best practices in acquiring, implementing, managing, and measuring information security. Hacker Halted provides EC-Council certification training, including the renowned Certified Ethical Hacker (CEH) program (a recently accepted certification of DoD Directive 8570.01M Change 2). Since 2004, Hacker Halted has been held in Miami, Myrtle Beach, Kuala Lumpur, Singapore, Dubai, Mexico City, Cairo, Taipei, Guangzhou, and Tokyo. More information about Hacker Halted is available at http://www.hackerhalted.com.
The U.S. Cyber Challenge (USCC) and the International Council of E-Commerce Consultants (EC-Council) today announced the recipient of a seat at the Global Cyberlympics, an international team ethical hacking competition. Chad Weber, a sophomore at Vermont Technical College, earned admission to Cyberlympics by scoring first place in the USCC Cyber Quests, a national competition focused on testing participants’ ability to identify and interpret web application attacks.
Nearly 500 students from more than 160 schools across 43 states registered for Cyber Quests III, which concluded on September 15. A number of post-graduate and professionals participated as well. The second place winner was Ben Toews, a graduate of DePaul University in Illinois. Third place winner was Dan Borges, a senior at East Stroudsburg University in Pennsylvania. Winners were determined based on who achieved the highest score in the shortest amount of time. The complete scoreboard of participants is available online.
“I’m very excited at having won this competition, and very thankful for all of the opportunities that the USCC has provided to me,” said Weber.
In addition to providing a seat at the CyberLympics, the EC-Council also sponsored prizes for the first, second and third place winners that include EC-Council’s flagship Certified Ethical Hacker (CEH) v7 training, Security+ training library by Element K, official courseware by EC-Council Press, exam vouchers and passes for Hacker Halted, TakeDownCon and CAST cyber security conferences. Read more…
Over the years there has been a lot of ink spilled, keys clicked and blood shed over the morass of information security-related professional certifications that have popped up across the landscape like proverbial weeds in the garden.
Like the story of Goldilocks and the porridge – “This one’s too technical”, “that one’s not technical enough” – “ah, this one’s just right”. And some would argue that holders of certain “gold-standard” certifications are not necessarily security-savvy. The rhetoric goes on and on and on.
From my perspective, certifications are analogous to a college degree. There are incredibly smart and capable people that do and do not have degrees. There are no guarantees when it comes to a person’s knowledge, experience, and capabilities.
However, if one does have a college degree it reflects that some commitment had been made by the individual to study and earn the degree. And depending on the quality of the school and program, one would expect there has been some standard of study attained as part of their chosen course of study.
Likewise, pursuing professional certifications reflects one’s commitment to earning the certification, adhering to some standard or body of knowledge that is the foundation for the certification, and typically maintaining the certification by renewal/retesting or continuing education requirements.
This leads me to EC Council’s new C|CISO – Certified Chief Information Security Officer certification. I have been following EC Council’s C|EH – Certified Ethical Hacker certification since its inception. Read more…
In light of increasing hacker sophistication and lack of banking security infrastructure, small and medium enterprises (SMEs) across the world may face a bleak future if they do not secure their networks against upcoming cyber threats which are on the rise, says network security training expert EC-Council.
Cyber criminals are stealing as much as $1 billion a year from the accounts of small to medium companies (SMEs) in the United States and Europe, according to estimates from Dell SecureWorks, a security arm of the computer maker. With rising incidences of hacking and other such network defence issues, network defence expert EC-Council advises SMEs to educate their employees on good information security practices and habits.
According to a recent Bloomberg report, overseas gangs target small commercial accounts protected by rudimentary security measures at community or regional banks. The accounts typically aren’t covered by fraud insurance, as individual accounts are, and businesses often find themselves held accountable by the banks for their losses.
Owners of SMEs conventionally face the challenge of having to be a jack of all trades, combining a keen knowledge of their core businesses with a basic knowledge of many other specialised fields such as IT Security. Read more…
Global Information Security Certification Institution EC-Council issued stern warnings about a lack of wireless security implemented by medical device manufacturers, after the American House Energy and Commerce Committee expressed concern about regulating the wireless security of medical devices.
Albuquerque, NM (PRWEB) September 22, 2011
Manufacturers of medical devices need to tread carefully when implementing wireless technologies such as Bluetooth in their equipment, says EC-Council, a leading global information security expert. In high-risk industries such as healthcare, the smallest innocuous mistake may often turn fatal.
At the recent 2011 Black Hat hacker conference in Las Vegas, security researcher and Type 1 diabetic Jerome Radcliffe demonstrated the vulnerabilities of his own wireless insulin pump and glucose meter by disrupting its operations through electronic interference. Although there was no real harm done, it was a clear example of how susceptible life-sustaining devices were to external influence.
This shocking demonstration showed a lack of awareness of such medical wireless security risks among legislators in the country, raising alarm among the members of the House Energy and Commerce Committee. Soon after, Democratic Representatives Anna Eshoo and Ed Markey sent letters of concern to the Government Accountability Office, asking for a review of the safety screening policies of the Federal Communications Commission.
Jay Bavisi, the president of EC-Council, says; “The time for the industry to take wireless security seriously is long overdue”. He pointed out that although the medical industry had made great progress in new advancements such as adopting wireless technology, the security aspect of such emerging technologies was not sufficiently catching up. Read more…
Cloud computing looks set to become the next big thing, but security concerns mar its adoption as the United States gets ready to pump US$53 billion into fourth-generation networks over the next five years. EC-Council offers cutting-edge solutions such as cryptography courses and cryptanalysis training for individuals with security concerns over emerging key technologies.
New York City, NY (PRWEB) September 22, 2011
Amazon, Microsoft, and Sonyare examples of just some companies that have recently made headlines for all the wrong reasons, having had their cloud computing efforts breached by unethical hackers. EC-Council, an international information security certification body, reports that without proper infrastructure and cryptanalysis training, usage of cloud computing may never be a fully secure platform for individuals or businesses.
Jay Bavisi, the President of EC-Council, says that even though general cloud architecture is relatively secure, it is easy for irreparable damage to be done to online stored data once the first layer of security is breached by an intruder.
Cloud-based services require an operation and management method similar to enterprise systems, demanding well-encrypted data with secure physical locations. With cloud services, every piece of data is stored on a physical hard drive or in solid state memory. This data is thus accessible to anyone with an Internet connection, further highlighting the importance of secure protection. Read more…
From this September Ethical Hacking for Computer Security students at Northumbria University’s School of Computing, Engineering and Information Sciences (CEIS) will be receiving two qualifications for the price of one.
Budding computer security experts will study the International Council of E-Commerce Consultants (EC-Council) Certified Ethical Hacker programme as part of their degree, receiving a separate professional qualification from the Council. Better yet, Northumbria University will be the first UK institution to offer the qualification for no extra cost to students.
The EC-Council is a member-based organisation that certifies individuals in various e-business and information security skills. It offers a range of programmes in over 60 countries through a training network of more than 450 training partners globally. Individuals who have achieved EC-Council certifications include those from some of the finest organisations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations.
The certification will provide a boost to the CVs of all of the course’s new and current students, with those starting their final year in September the first to qualify. Normally costing around £3,000 to study separately, the inclusion of this certification within the programme’s fees provides a welcome added value to the students.
The markets for malware are expanding at a rapid pace, says digital forensic training expert EC-Council. As such, major security plans to address privacy concerns are being green-lit across various platforms for mobile devices and cloud computing.
Technology companies are ramping up their efforts to curb malware and other undesirable software, in an effort to keep hackers from affecting profits from the lucrative mobile market. This shows the emphasis being placed on mobile forensics as a solution, and how knowledge of mobile operating systems can help both companies and end-users prevent unnecessary data interference, says Jay Bavisi, the President of EC-Council. Read more…